Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

08:05 AM
Simon Marshall
Simon Marshall
Simon Marshall

Billions of Business Files & Data Are Exposed Online to Anyone

A report from Digital Shadows finds that more than a billion files, including sensitive data and intellectual property, are exposed to the greater Internet. Much of this is due to antiquated technology.

Enterprises are only as strong as the weakest link in their cybersecurity chain. As if the struggle to keep up with data exfiltration weren't enough, companies are leaving files unsecured on the public Internet.

How many files? There's no way of knowing for sure, but at least hundreds of millions.

That's according to the results of an investigation by Digital Shadows, a San Francisco-based digital risk firm, that highlights the need to manage external digital footprints rather than worrying about data exfiltration.

In terms of data volume, the infamous Amazon S3 buckets issue was big, but even that only accounts for 7% of all the exposed data found in the investigation, which totals 12 petabytes or roughly 4,000 times the size of the Panama Papers leak. (See Amazon S3 Errors Hit Home Again.)

That sheer volume of data is worrying, of course, because it suggests how much information might be readily available for exploit by malicious parties. But even more troubling is the amount of unique intellectual property (IP) openly accessible that would provide an easy and significant payday on the black market.

This insecure data consists in some cases of pending patent applications, employee payroll and tax return information and even, ironically, internal security assessments that could be sold or traded, or alternatively leveraged for fine-grain spear-phishing or other attacks.

"While we often hyper-focus on responding to adversaries conducting intrusions and exfiltrating data, we aren't focusing on external digital footprints (or) data that is already publicly available via misconfigured devices," said Rick Holland, CISO at Digital Shadows.

Vulnerable data
The investigation report, based on data from the first quarter of 2018, reveals a smorgasbord of one and a half billion files from multiple enterprise sectors. The biggest overall cache found was 700,000 payroll files, followed by 60,000 tax files, but there were also about 14,500 files of leaked contact information and about 4,500 patient healthcare lists.

As an example of the depth of type of personal information that is available, an instance of consumer point-of-sale (POS) data was found openly available, including transaction times, places and even credit card information. This type of information is regularly propagated and resold on the Dark Web, the higher quality, the more valuable.

Unprotected IP was also discovered, in one instance, as a renewable energy patent summary marked as "strictly confidential." In another, proprietary source code that was part of a copyright application.

Third-party and contractor data was also discoverable including -- remarkably -- security assessments and the results of pen tests.

"It is hard enough for defenders to protect their own people, assets and infrastructure," Holland told Security Now, "(but) giving that control up to an external party only exacerbates the problem. I think (it's) only going to get more challenging as outsourcing and cloud computing adoption increases."

In fact, Holland was skeptical that the overall issue will ever be fixed at a global level, but felt that organizations in themselves could be successful, providing they accept the need to up their game.

The tale of data lost
"Security teams often have their heads in the sand when it comes to understanding their external digital footprint," Holland said. "Sometimes unwittingly and sometimes it is a conscious choice given the enormity of defending the modern enterprise. Trade-offs are made and monitoring your own infrastructure, SaaS, IaaS, PaaS as well as your business partners isn't a trivial task."

Want to hear more about the leading operator use cases for AI technologies? Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

One thing is for sure: older technologies, processes and standards are to blame.

Outside of the 7% of data represented by S3 buckets, the rest is mostly accounted for by older protocols and platforms. The report found that 33% of visible files were publicly exposed because enterprises use Server Message Block, 28% of them through rsync, and 26% from FTP servers. NAS drives and poorly constructed websites were also a problem, as were consumer devices misconfigured to be Internet-facing.

Clearly, businesses are investing in new technologies, but there's still a huge amount of digital footprint clean-up to be done to make those investments watertight.

Organizations' first step should be to "stop the bleeding" by locking down data in any infrastructure that is under their direct control, move beyond the usual box-ticking exercise with third parties, and then work with a takedown service provider to get remaining content taken offline, according to Holland.

This process can be very complex, but network reconnaissance tools such as NMAP can assist by persistently monitoring the digital footprint, and when a new service comes online, immediately validating its security controls.

"Like anything else, the key is getting visibility into the degree of the problem, so that the appropriate investment can be made," said Holland. "Right now, many organizations are making decisions without having a full appreciation for the risks."

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-27
checkpath in OpenRC through 0.42.1 might allow local users to take ownership of arbitrary files because a non-terminal path component can be a symlink.
PUBLISHED: 2020-10-26
libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.
PUBLISHED: 2020-10-26
An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application usi...
PUBLISHED: 2020-10-26
Ruckus through is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
PUBLISHED: 2020-10-26
Ruckus vRioT through has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.